May 29, 2012

How Can You Search What Devices are Connected to Your Home Wireless Internet Connection

People who have
wireless connections often complain that they suspect someone else is using
their Wi-Fi because the internet speed connection stays low. They are anxious
to know ways to find out if someone is really stealing the bandwidth of their
Wi-Fi. So, how can they find it out and what measures can they take to stop it,
right away? High speed internet providers in my area also offer
the best solution for such problems.

Unfortunately, if someone is accessing your
Wi-Fi, chances are that they might also be able to access some of your folders.
However, this depends on the security measures that you use. Moreover, if
someone is using your Wi-Fi connection for illegal business, it might be
equally dangerous to you as well. In this article, we will help you find if
your Wi-Fi is really being stolen and how you can put an end to it.

1. Low Tech Method

Your wireless router will have indicator
lights which show hardwired network connections, internet connectivity, and any
wireless activity. Now to know if someone is really using your Wi-Fi
connection, shut your all wireless devices and see if the light still blinks. The
only issue doing this is that you still might have other Wi-Fi devices such as
gaming console or television left to unplug, and also it does not give out much
information. This method can mainly be used to confirm your suspicion at a
given moment.

2. Network Admin Method

The administrative console of your router
can help you explore more about your wireless network and make changes to
security settings. In order to log into the console, simply go to the IP
address of your router. This address can be found on Windows by clicking Win+R.
Now, type CMD and ipconfig in your window and find “Default Gateway” IP
address. If you use Mac, open Network Preference pane and get the IP address
mentioned next to Router.

Next, type the IP in the browser window. You
will be asked to provide your login details of the router. The router
documentation will be having your login details only if you did not change your
default settings. This process will typically ask you for admin and password
fields. You must change your login information when you enter the router
console for security. Hackers always look for such chances to get into the
router consoles.

Each router is different. When you log into
your router, immediately look out for connected devices. It can be known as “My
Network” (Verizon routers) or “Attached devices” (Netgear). It must give you a
detailed list of MAC addresses, IP addresses and all device names if they are
detectable. Compare all connected devices to the gear and look out for unwanted
users.

3. Detective Method: Using Network Monitoring Software Tool

It is extremely beneficial to be able to
get into the network admin panel. Here you can easily view logs and change
settings; however, you might also want to go through advanced network auditing
and this is where MoocherHunter comes handy. MoochHunter is a part of the
Organizational Systems Wireless Auditor (OSWA). According to the description of
the software, it can easily geo-locate wireless hackers by sending traffic
across the network.

This software also does not run in Windows
as executable, but rather needs to be burned on to a CD to boot on the
computer. This software is quite well known to be able to detect if anyone is
using your Wi-Fi network. It is a great way to learn how hackers and other
users try to get into your system.

4. Enhance Your Wi-Fi Security

If you use WPA2 or even WPA, your system is
secure enough. If you have completed all the required steps, but the browser
still seems very slow, you should think about speeding up the browser. If you
use WEP or your connection is not encrypted, your system can be easily cracked
by anyone looking for connections. If you do not know which encryption is being
used in your network, go to wireless connection properties which will recognize
it immediately. High speed internet providers in my area provide enhance Wi-Fi
security solutions as well.

Remember, you should continue using WPA2
encryption whether you discovered someone using your Wifi connection or not,
and manage other router setup essentials. If you still want to continue using
open wireless network; get a new, secured wireless network and open the
unsecured network only for guests and WEP devices only upon need.